CVE-2023-45162

9.9 CRITICAL

📋 TL;DR

CVE-2023-45162 is a blind SQL injection vulnerability in 1E Platform that allows attackers to execute arbitrary SQL commands, potentially leading to remote code execution. Affected systems include 1E Platform versions 8.1.2, 8.4.1, 9.0.1, and SaaS versions below 23.7.1. Organizations using these versions are at risk of complete system compromise.

💻 Affected Systems

Products:
  • 1E Platform
Versions: 8.1.2, 8.4.1, 9.0.1, SaaS versions below 23.7.1
Operating Systems: Windows-based deployments
Default Config Vulnerable: ⚠️ Yes
Notes: SaaS implementations on v23.7.1 automatically receive the fix. Earlier SaaS versions require manual upgrade.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative access, data exfiltration, and persistent backdoor installation across the network.

🟠

Likely Case

Database compromise leading to sensitive data theft, privilege escalation, and lateral movement within the network.

🟢

If Mitigated

Limited impact with proper network segmentation, WAF protection, and minimal exposed attack surface.

🌐 Internet-Facing: HIGH - SQL injection can be exploited remotely without authentication, potentially leading to RCE.
🏢 Internal Only: HIGH - Even internally, SQL injection can lead to full system compromise and lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Blind SQL injection requires more sophisticated exploitation than standard SQLi but can lead to RCE.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Hotfixes: Q23166 (v8.1.2), Q23164 (v8.4.1), Q23169 (v9.0.1), Q23173 (SaaS v23.7.1+)

Vendor Advisory: https://www.1e.com/trust-security-compliance/cve-info/

Restart Required: Yes

Instructions:

1. Identify your 1E Platform version. 2. Apply the corresponding hotfix: Q23166 for v8.1.2, Q23164 for v8.4.1, Q23169 for v9.0.1. 3. For SaaS below v23.7.1, contact 1E to upgrade to v23.7.1 or later. 4. Restart services after patch application.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to 1E Platform to only trusted administrative networks

Web Application Firewall

all

Deploy WAF with SQL injection protection rules in front of 1E Platform

🧯 If You Can't Patch

  • Immediately isolate affected systems from internet and untrusted networks
  • Implement strict network access controls and monitor for SQL injection attempts

🔍 How to Verify

Check if Vulnerable:

Check 1E Platform version via administrative console or version files. If version is 8.1.2, 8.4.1, 9.0.1, or SaaS below 23.7.1, system is vulnerable.

Check Version:

Check 1E administrative console or examine version files in installation directory

Verify Fix Applied:

Verify hotfix installation through 1E Platform patch management interface or check for hotfix files: Q23166, Q23164, Q23169, or Q23173 depending on version.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns in database logs
  • Multiple failed SQL injection attempts in web logs
  • Unexpected process execution from 1E services

Network Indicators:

  • SQL injection payloads in HTTP requests to 1E endpoints
  • Unusual outbound connections from 1E servers

SIEM Query:

source="1E_platform_logs" AND (sql_injection OR "UNION SELECT" OR "EXEC(" OR "xp_cmdshell")

🔗 References

📤 Share & Export